CF Ta2
CF Ta2
DAS (Direct-
NAS (Network-
Feature Attached SAN (Storage Area Network)
Attached Storage)
Storage)
Directly
Connectio Connected to a Connected via dedicated
connected to a
n Type network network (e.g., Fibre Channel)
single device
Local file system
Access File-level protocols Block-level access (e.g., iSCSI,
access (e.g.,
Protocol (e.g., NFS, SMB) Fibre Channel)
NTFS)
Data Limited to one Shared by multiple Shared by multiple servers at
Sharing machine users and devices block level
Limited to the
Scalable for network Highly scalable for large
Scalability capacity of the
file access enterprise environments
device
Moderate
High
Performan performance, High performance, low latency,
performance for
ce dependent on and throughput
local access
network
High cost due to specialized
Relatively low
Cost Moderate cost hardware and network
cost
infrastructure
Manageme
Moderate Complex, requires specialized
nt Simple, easy to
complexity, requires skills for setup and
Complexit set up
network setup maintenance
y
**** What strategies can organizations employ to optimize cloud storage costs when using
databases in a cloud environment?
---- 1. Choose the Right Database Type 2. Use Tiered Storage 3. Enable Auto-
Scaling 4. Implement Data Lifecycle Policies 5. Compress Data 6. Optimize
Backups 7. Clean Up Unused Resources 8. Monitor Storage Usage 9. Reserve
Capacity for Predictable Workloads 10. Use Multi-Region Strategically 11.
Deduplicate and Normalize Data 12. Review and Optimize Schema Design
**** How to Keep a Database Safe and Secure in the Cloud
1. Encrypt Data (At Rest and In Transit)--Encrypt sensitive data stored in the database (at
rest).---Use SSL/TLS to encrypt data transmitted between applications and the database
(in transit).=====Example:--Amazon RDS uses AWS Key Management Service (KMS) for
encryption at rest.--TLS is used for secure data transfer.
2. Use Identity and Access Management (IAM)---Implement role-based access control to
limit access to the database.--Grant users the least privilege necessary to perform their
tasks.====Example:--AWS IAM allows defining who can access databases and what
operations they can perform (read/write/admin).--Azure Active Directory (AD) can manage
access to Azure SQL Database.
Security Measures and Best Practices for Safeguarding Data in the Cloud
1. Data Encryption---At Rest: Encrypt data stored on disks using AES-256.---In Transit: Use
SSL/TLS to secure data during transmission.----Managed Keys or Bring Your Own Key
(BYOK) via services like AWS KMS, Azure Key Vault.
2. Identity and Access Management (IAM)---Grant least privilege access.---Use role-based
access controls and MFA (Multi-Factor Authentication).
3. Regular Backups and Disaster Recovery---Automate backups and test recovery plans.---
-Use cross-region replication for high availability.
4. Monitoring and Logging----Use tools like AWS CloudTrail, Azure Monitor, GCP
Operations Suite to track access and changes.
5. Firewalls and Network Isolation----Use VPCs, security groups, and network access
control lists (ACLs) to isolate resources.
6. Patch Management---Keep OS and database software updated to fix vulnerabilities.----
Managed services handle patching automatically.
7. Compliance and Governance Tools---Use tools to enforce policies, auditing, and
compliance (e.g., AWS Config, Azure Policy).